New “NotLockBit” Ransomware Attack Windows and macOS

New “NotLockBit” Ransomware Attack Windows and macOS

A sophisticated new ransomware family, dubbed NotLockBit, is creating waves in the cybersecurity world with its advanced capabilities and cross-platform functionality. Mimicking the techniques of the infamous LockBit ransomware, NotLockBit has proven to be...
20 Years Old macOS Vulnerability Allow Attackers To Gain Root Access Remotely

20-Year-Old macOS Vulnerability Allows Attackers To Gain Root Access Remotely

A security researcher uncovered a critical macOS vulnerability involving privilege escalation in Apple's MallocStackLogging framework, which had gone undetected for nearly 20 years. The bug, tracked as CVE-2023-32428, was discovered in March 2023 and...
macOS WorkflowKit Race Vulnerability Let Malicious Apps Intercept Shortcuts

macOS WorkflowKit Race Vulnerability Let Malicious Apps Intercept Shortcuts

A critical vulnerability in macOS WorkflowKit, the framework underpinning Apple's Shortcuts app, has been disclosed. This vulnerability allows malicious applications to intercept and modify user-imported shortcuts. Identified as CVE-2024-27821, this race condition in WorkflowKit poses...
Hackers Leveraging Extended Attributes To Evade detection In macOS Systems

Hackers Leveraging Extended Attributes To Evade Detection In macOS Systems

Researchers discovered a novel approach employed by the threat actor to conceal codes using Extended Attributes to avoid detection in macOS devices. Extended attributes are metadata that can be linked to different file systems' files...
Threat Actors Attacking macOS Users with New Multi-Stage Malware

Hackers Attacking macOS Users with New Multi-Stage Malware

North Korean threat actors, likely associated with BlueNoroff, have launched multi-stage malware attacks targeting cryptocurrency businesses, expanding their toolkit to include RustDoor/ThiefBucket and RustBucket campaigns.  Hidden Risk, a DPRK-linked threat actor, employed a novel persistence...
New MacOS Malware Let Attackers Control The Device Remotely

New MacOS Malware Let Attackers Control The Device Remotely

A remote access trojan (RAT), HZ RAT, that has been attacking Windows-based devices since at least 2020, was recently upgraded and changed to target Mac users as well.  Typically, a RAT is a type of...
Apple iOS 18 Released with Fixes for 32 Security Vulnerabilities

Apple iOS 18 Released with Fixes for 32 Security Vulnerabilities

Apple has released iOS 18, addressing a total of 32 security vulnerabilities across various components of its operating system. This comprehensive update is available for iPhone XS and later models, as well as iPad Pro...
HZ Rat Attacking macOS Users Via Messaging Platform WeChat

HZ Rat Attacking macOS Users Via Messaging Platform WeChat

Hackers target macOS as its growing user base makes it an increasingly attractive target.  Despite its reputation for strong security, macOS vulnerabilities exist, and exploiting them can give hackers access to valuable data or control...
Microsoft macOS Apps Vulnerability

Microsoft macOS Apps Vulnerability Allows Hackers to Record Audio/Video

Cisco Talos has identified eight security vulnerabilities in Microsoft applications running on the macOS operating system, raising concerns about potential exploitation by adversaries. These vulnerabilities, if exploited, could allow attackers to hijack the permissions...
New Banshee MacOS Stealer Attacking Users to Steal Keychain Data

New Banshee MacOS Stealer Attacking Users to Steal Keychain Data

International authorities have successfully seized the servers associated with the notorious Dispossessor ransomware group. This operation marks a critical step in combating ransomware attacks that have plagued individuals, businesses, and institutions worldwide. According to...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...